Remove Fractional CTO Remove Malware Remove Network Remove Security
article thumbnail

AI's Offensive & Defensive Impacts

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more.

article thumbnail

AI Is Changing Security — 5 Predictions from Cortex

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a weekly blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consulting, engineering and more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Meet ‘misinfosec’: Fighting fake news like it’s malware

The Parallax

As founder and lead scientist of Climate Feedback , a site through which a network of scientists share assessments of media coverage related to climate change, one of Vincent’s most recent victories was in getting the conservative news site The Western Journal in February to pull a column espousing unsupported claims.

Malware 189
article thumbnail

Beyond Visibility: Proactive Cloud Workload Security in the Real World

Prisma Clud

Virtual machines (VMs) secure a solid 22% share, while both container as a service (CaaS) and containers contribute equally, each making up 18% of the overall workload ecosystem. 3 Foundational Takeaways Let's explore three vital learnings that have emerged in this dynamic landscape, shaping the way organizations approach cloud security.

Cloud 105
article thumbnail

Cybersecurity Snapshot: Phishing Scams, Salary Trends, Metaverse Risks, Log4J Poll

Tenable

Get the latest on worrisome phishing stats; businesses’ embrace of the metaverse, come what may; a (small) improvement in CISO job stability; the compensation cost of security leaders; and more! Cybersecurity and Infrastructure Security Agency (CISA) has revealed distressing stats about the prevalence and success of phishing attacks.

article thumbnail

Register for 12 Jun 2014 Webinar: Automated Removal of Advanced Threats

CTOvision

If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation.

article thumbnail

12 Jun 2014 Webinar: Automated Removal of Advanced Threats

CTOvision

If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation.